Filtry
wszystkich: 8433
wybranych: 6047
-
Katalog
- Publikacje 6047 wyników po odfiltrowaniu
- Czasopisma 112 wyników po odfiltrowaniu
- Konferencje 2 wyników po odfiltrowaniu
- Osoby 150 wyników po odfiltrowaniu
- Projekty 1 wyników po odfiltrowaniu
- Aparatura Badawcza 1 wyników po odfiltrowaniu
- Kursy Online 130 wyników po odfiltrowaniu
- Wydarzenia 5 wyników po odfiltrowaniu
- Dane Badawcze 1985 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: TREE PROTECTION
-
Multisensor System for the Protection of Critical Infrastructure of Seaport
PublikacjaThere are many separated infrastructural objects within a harbor area that may be considered “critical”, such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons...
-
Multimodal Surveillance Based Personal Protection System
PublikacjaA novel, multimodal approach for automatic detection of abduction of a protected individual, employing dedicated personal protection device and a city monitoring system is proposed and overviewed. The solution is based on combining four modalities (signals coming from: Bluetooth, fixed and PTZ cameras, thermal camera, acoustic sensors). The Bluetooth signal is used continuously to monitor the protected person presence, and in case...
-
Threats to Rural Landscape and Its Protection in Poland
PublikacjaThe article describes the premises and conditions for the implementation of a pro-landscape spatial policy in rural areas in Poland. It presents the erosion of spatial order in a large part of the country’s territory. Firstly, the state of protection of the rural landscape and the legal aspects of shaping the space of rural areas are described. Secondly, the location is depicted, and the main physiognomic and environmental threats...
-
Evaluation of Lightning Protection Earthings by Impulse Tests
PublikacjaW artykule zamieszczono opis nowej procedury pomiaru uziemień odgromowych metodą udarową. Zgodnie z propozycję podczas testu udarowego można pomierzyć nie tylko impedancję udarową uziemienia, ale także ocenić jego rezystancję oraz współczynnik udaru. Wynik takiego badania uwzględnia tylko tę część uziomu, którą określa się jako jego długość efektywną.
-
Electroconducting polymers as a corrosion protection materials review
PublikacjaAutorzy przywołują 89 pozycji literaturowych dotyczących użycia polimerów elektroaktywnych w ochronie metali przed korozją. Wykazano, że najczęściej wykorzystywany w tym celu jest polipirol. Przytoczone prace dotyczą ochrony stali, aluminium, cynku oraz stopów magnezu.
-
Consumers’ Need of Privacy Protection – Experimental Results
Publikacja -
Protection System Design of Induction Motor for Industries
PublikacjaThe fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...
-
Protection System Design of Induction Motor for Industries
PublikacjaThe fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...
-
The Use of Bacteriophages in Animal Health and Food Protection
Publikacja -
An integrated analysis of protection layers in hazardous systems
PublikacjaGłównym tematem niniejszej publikacji jest dyskusja nad wybranymi zagadnieniami związanymi z analizą bezpieczeństwa funkcjonalnego infrastruktury krytycznej oraz obiektów podwyższonego ryzyka. Problematyka bezpieczeństwa funkcjonalnego związana jest z międzynarodowymi normami IEC 61508 oraz IEC 61511. W artykule przedstawiono problematykę zintegrowanej oceny bezpieczeństwa funkcjonalnego wraz z uwzględnieniem analizy warstw zabezpieczeń...
-
Protection of bridges against stray current corrosion
PublikacjaA case study of Siennicki Bridge stray current corrosion hazard is presented. A corrosion risk was caused by incorrectly designed tram line traction which goes over the bridge. No dielectric insulation between running rails and bridge steel construction was used. A variety of protection methods against stray currents are described. Characteristics of the endangered bridge were described. Impressed current cathodic protection system...
-
Region protection/restoration scheme in survivable networks
PublikacjaW artykule zaproponowano nowe podejście do zabezpieczania/odtwarzania obszarowego, gdzie scieżka zabezpieczająca chroni pewien obszar ścieżki aktywnej. Wykazano, że ta metoda utrzymuje zarówno czasy odtwarzania, jak i współczynnik wykorzystania zasobów w rozsądnych granicach. Ze względu na fakt, że zadanie znalezienia ścieżek aktywnych i ścieżek zabezpieczających jest NP-zupełne, autorzy stworzyli algorytm heurystyczny i pokazali,...
-
Integrated protection/restoration in survivable multilayer architectures
PublikacjaArtykuł przedstawia nową koncepcję projektowania wielowarstwowych architektur sieci przeżywalnych, wykorzystującą informację międzywarstwową do zabezpieczania odtwarzania na wypadek pojedyńczej awarii węzła lub łącza w sposob zapobiegający propagacji awarii. Oryginalne zadanie optymalizacji całej zintegrowanej architektury przeżywalnej sformułowano jako zadanie programowania całkowitego. Jest ono NP-zupełne i zaproponowano algorytm...
-
Protection system against electromagnetic leak of information
PublikacjaW pracy omówiono problem zabezpieczenia przed ulotem elektromagnetycznym informacji. Scharakteryzowano obowiązujace w tym względzie wybrane dokumenty normatywne. Opisano stosowane sposoby zapobiegania ulotowi informacji oraz prezentowano metodykę badawczą. Przedstawiono wybrane wyniki pomiarowe.
-
Conducting composites as cable anodes in cathodic protection
PublikacjaOpisano zasadę działania oraz podstawowe parametry charakteryzujące układ anodowy z wykorzystaniem anod kablowych w systemie ochrony katodowej podziemnych konstrukcji. W tej metodzie ochrony jako materiał anodowy wykorzystywany jest kompozyt przewodzący, którego właściwości mechaniczne umożliwiają budowę anody w formie kabla biegnącego wzdłuż trasy konstrukcji podziemnej. Wykazano, że zawartość grafitu w elektrodzie kompozytowej...
-
Impulse Impedance Measurements of Lightning Protection Earthings
PublikacjaLightning protection earthing systems should be tested at currents with time parameters similar to those of lightnings. A method and definition of a measured value of impulse impedance are introduced. The impulse impedance was determined by a quotient of voltage drop on the tested earthing to a value of current in measure circuit. The usefulness of the impulse method for lightning protection evaluation is tested on radio base stations...
-
Built Heritage, Sustainable Development, and Natural Hazards: Flood Protection and UNESCO World Heritage Site Protection Strategies in Krakow, Poland
Publikacja -
An algorithm for listing all minimal double dominating sets of a tree
PublikacjaWe provide an algorithm for listing all minimal double dominating sets of a tree of order $n$ in time $\mathcal{O}(1.3248^n)$. This implies that every tree has at most $1.3248^n$ minimal double dominating sets. We also show that this bound is tight.
-
An Algorithm for Listing All Minimal 2-Dominating Sets of a Tree
PublikacjaWe provide an algorithm for listing all minimal 2-dominating sets of a tree of order n in time O(1.3248n) . This implies that every tree has at most 1.3248 n minimal 2-dominating sets. We also show that this bound is tigh.
-
An Alternative Proof of a Lower Bound on the 2-Domination Number of a Tree
PublikacjaA 2-dominating set of a graph G is a set D of vertices of G such that every vertex not in D has a at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. Fink and Jacobson [n-domination in graphs, Graph theory with applications to algorithms and computer science, Wiley, New York, 1985, 283-300] established the following lower bound on the 2-domination...
-
A lower bound on the total outer-independent domination number of a tree
PublikacjaA total outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of G has a neighbor in D, and the set V(G)D is independent. The total outer-independent domination number of a graph G, denoted by gamma_t^{oi}(G), is the minimum cardinality of a total outer-independent dominating set of G. We prove that for every nontrivial tree T of order n with l leaves we have gamma_t^{oi}(T) >= (2n-2l+2)/3,...
-
An upper bound on the 2-outer-independent domination number of a tree
PublikacjaA 2-outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of V(G)D has a at least two neighbors in D, and the set V(G)D is independent. The 2-outer-independent domination number of a graph G, denoted by gamma_2^{oi}(G), is the minimum cardinality of a 2-outer-independent dominating set of G. We prove that for every nontrivial tree T of order n with l leaves we have gamma_2^{oi}(T) <= (n+l)/2,...
-
An upper bound on the total outer-independent domination number of a tree
PublikacjaA total outer-independent dominating set of a graph G=(V(G),E(G)) is a set D of vertices of G such that every vertex of G has a neighbor in D, and the set V(G)D is independent. The total outer-independent domination number of a graph G, denoted by gamma_t^{oi}(G), is the minimum cardinality of a total outer-independent dominating set of G. We prove that for every tree T of order n >= 4, with l leaves and s support vertices we have...
-
A lower bound on the double outer-independent domination number of a tree
PublikacjaA vertex of a graph is said to dominate itself and all of its neighbors. A double outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D, and the set V(G)D is independent. The double outer-independent domination number of a graph G, denoted by gamma_d^{oi}(G), is the minimum cardinality of a double outer-independent dominating set of G. We...
-
An upper bound for the double outer-independent domination number of a tree
PublikacjaA vertex of a graph is said to dominate itself and all of its neighbors. A double outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D, and the set V(G)\D is independent. The double outer-independent domination number of a graph G, denoted by γ_d^{oi}(G), is the minimum cardinality of a double outer-independent dominating set of G. We prove...
-
Gate Driver with Overcurrent Protection Circuit for GaN Transistors
PublikacjaThe improvement of the gate driver for GaN transistor is presented in this paper. The proposed topology contains the overcurrent protectionwith the two-stage turning off and independent control of turn on and off time of the GaN transistor. The operation of driver and its application in thehalf-bridge converter are described using both simulation and prototype measurements. The overcurrent protection was tested in Double Pulse...
-
Anti‐corrosion protection of chimneys and flue gas ducts
Publikacja -
Functional safety and security assessment of the control and protection systems
PublikacjaW artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.
-
Research on protection mechanisms of Resilient Packet Ring Network.
PublikacjaPaper describes iSteering - a new method to control traffic in case of RPR network failure. There's comparison of packet wrapping, steering and our proposed method iSteering, which can be used in case of transmitter/receiver or fiber failure. Numerical analysis for even and random traffic flow has been made in order to compare packet wrapping, steering and iSteering. The results of all the tests are included.
-
Research on protection mechanisms of Resilient Packet Ring Network.
Publikacja.
-
PROBLEMS WITH CORROSION PROTECTION STEEL STACKS IN FGD SYSTEMS
PublikacjaThis paper presents problems associated with corrosion of steel stacks and changes in philosophy of corrosion protection when implemented into flue gas desulphurization systems. In-situ tests were taken by means of electrochemical impedance spectroscopy at a stack which discharges flue gas before wet lime/limestone desulphurization. A very rapid soaking of spherical infill vinylester coating with electrolyte has been observed....
-
For Your Eyes Only – Biometric Protection of PDF Documents
PublikacjaThe paper introduces a concept of a digital document content encryption/decryption with facial biometric data coming from a legitimate user. Access to the document content is simple and straightforward, especially during collaborative work with mobile devices equipped with cameras. Various contexts of document exchange are presented with regard to the next generation pro-active digital documents proposed by authors. An important...
-
The role of a planned management in the protection and preservation of wooden architecture
PublikacjaArtykul dokumentuje role i zasady ochrony dziedzictwa architektury drewnianej przy uzyciu nowego instruumentu jakim jest plan zarzadzania obiektem zabytkowym. Przedstawione zostalo w powiazaniu z Planem Zarzadzania Koscioła Gotyckiego w Mariance koło Pasłeka, wykonanego we wspolpracy Politechniki Gdańskiej oraz SBH ICOMOS, PKN ICOMOS.
-
Modernist Industrial Architecture and Its Protection - the Port of Gdynia
PublikacjaOchrona międzywojennej architektury przemysłowej na tak specyficznym obszarze jak funkcjonujący port morski, jest zadaniem trudnym - niezbędne są kompromisy pomiędzy względami konserwatorskimi i użytkowymi. Artykuł prezentuje architekturę portu gdyńskiego oraz złożoną problematykę jej ochrony konserwatorskiej.
-
Reliable Anycast and Unicast Routing: Protection against Attacks
PublikacjaObecne sieci są przeważnie chronione przed awariami losowymi, a topologie sieci są w większości uznawane za regularne. Znane mechanizmy ochrony dotyczą typowo transmisji unicast (jeden-do-jednego). Jednakże w związku z obserwowaną konwergencją technologii/usług, inne odmiany transmisji (np. anycast - jeden-do-jednego-z-wielu) nabierają znaczenia. Co więcej, okazuje się, iż często awarie nie mają losowego charakteru, a topologie...
-
Fire Protection and Materials Flammability Control by Artificial Intelligence
PublikacjaFire safety has become a major challenge of materials developers because of the massive production of organic materials, often combustibles, and their use for different purposes. In this sense, fire safety is critically considered in the development of engineering materials [1, 2]. The multiplicity of parameters contributing to the development of formulation of flame-retardant materials from one side and the sustainability concerns...
-
The asymptotic formula for the error in orthogonal projection
PublikacjaW pracy podano formułę asymptotyczną błędu aproksymacji dla rzutów ortogonalnych w normie L^p.
-
Hybridized PWM Strategy for Three- and Multiphase Three-Level NPC Inverters
PublikacjaA simple hybridized pulsewidth modulation (PWM) algorithm for three- and multiphase three-level neutral point clamped (NPC) inverters is proposed. The proposed solution is based on classical space vector PWM (SVPWM) algorithms for two-level inverters but can also be based on sinusoidal PWM with min–max injection. An additional level of output voltage is obtained by modifying the resulting switching patterns taking into account...
-
The delocalization of production to Poland
Publikacja -
Nanobiocatalysis for biofuel production
PublikacjaThe human race is relied on the use of conventional and non-renewable energy resources like fossil fuels for centuries. With the rising environmental issues linked with the use of these conventional energy resources, the trend soon shifted towards more robust and sustainable energy resources. In this regard, the different generations of biofuels have revolutionized the industrial sector by ensuring an eco-friendly and more economical...
-
Paired bondage in trees
PublikacjaW pracy zdefiniowano pojęcie liczby zniewolenia parami jako moc najmniejszego zbioru krawędzi, którego usunięcie z grafu spowoduje wzrost liczby dominowania parami. W szczególności scharakteryzowane są wszystkie drzewa, w których liczba zniewolenia wynosi 0, czyli takie, w których usunięcie dowolnego podzbioru krawędzi nie zwiększy liczby dominowania parami.
-
On the partition dimension of trees
PublikacjaGiven an ordered partition Π={P1,P2,…,Pt} of the vertex set V of a connected graph G=(V,E), the partition representation of a vertex v∈V with respect to the partition Π is the vector r(v|Π)=(d(v,P1),d(v,P2),…,d(v,Pt)), where d(v,Pi) represents the distance between the vertex vv and the set Pi. A partition Π of V is a resolving partition of G if different vertices of G have different partition representations, i.e., for every...
-
Preserving Trees in Automata
PublikacjaWe present a method to store additional information in a minimal automaton so that it is possible to compute a corresponding tree node number for a state. The number can then be used to retrieve additional information. The method works for minimal (and any other) deterministic acyclic finite state automata (DFAs). We also show how to compute the inverse mapping.
-
Isocyanate-Free Polyurethanes
PublikacjaIsocyanate-free polyurethanes (also called non-isocyanate polyurethanes, or NIPUs) are alternatives to the conventional (commercially used) polyurethanes synthesized using di- or polyisocyanates, polyols, and chain extenders with low molecular weight. The major routes of NIPUs’ synthesis involve polyaddition of cyclic carbonates and di- or polyamines, polycondensation of carbamates, and diols. The most important intermediates are...
-
Perfect hashing with pseudo-minimal bottom-up deterministic tree automata
PublikacjaWe describe a technique that maps unranked trees to their hash codes using a bottom-up deterministic tree automaton (DTA). In contrast to techniques implemented with minimal tree automata, our procedure builds a pseudo-minimal DTA. Pseudo-minimal automata are larger than the minimal ones but in turn the mapping can be arbitrary, so it can be determined prior to the automaton construction. We also provide procedures to build incrementally...
-
Critical Case Stochastic Phylogenetic Tree Model via the Laplace Transform
PublikacjaBirth–and–death models are now a common mathematical tool to describe branching patterns observed in real–world phylogenetic trees. Liggett and Schinazi (2009) is one such example. The authors propose a simple birth–and–death model that is compatible with phylogenetic trees of both influenza and HIV, depending on the birth rate parameter. An interesting special case of this model is the critical case where the birth rate equals the...
-
A self-stabilizing algorithm for finding a spanning tree in a polynomial number of moves
PublikacjaW pracy rozważa się rozproszony model obliczeń, w którym struktura systemu jest reprezentowana przez graf bezpośrednich połączeń komunikacyjnych. W tym modelu podajemy nowy samostabilizujący algorytm znajdowania drzewa spinającego. Zgodnie z naszą wiedzą jest to pierwszy algorytm dla tego problemu z gwarantowaną wielomianową liczbą ruchów.
-
Empirical analysis of tree-based classification models for customer churn prediction
PublikacjaCustomer churn is a vital and reoccurring problem facing most business industries, particularly the telecommunications industry. Considering the fierce competition among telecommunications firms and the high expenses of attracting and gaining new subscribers, keeping existing loyal subscribers becomes crucial. Early prediction of disgruntled subscribers can assist telecommunications firms in identifying the reasons for churn and...
-
A city is not a tree: a multi-city study on street network and urban life
PublikacjaChristopher Alexander, a British-American scholar, differentiated an old (natural) city from a new (planned) one by structure. The former resembles a “semilattice”, or a complex system encompassing many interconnected sub-systems. The latter is shaped in a graph-theoretical “tree”, which lacks the structural complexity as its sub-systems are compartmentalized into a single hierarchy. This structural distinction explains why, or...
-
Efficacy of rice husk biochar and compost amendments on the translocation, bioavailability, and heavy metals speciation in contaminated soil: Role of free radical production in maize (Zea mays L.)
Publikacja